Keys to Use in Your Queries
Also referred to as fields, keys define the data in your logs. Each event type contains a specific set of keys. Keys are the constant, while the values of a key can vary.
This topic contains the list of keys that occur in each standard event type in InsightIDR. This is known as the schema; the data structure that allows data to be read by the application.
It is helpful to know which keys you want to search in Log Search, so that you can create queries on the key-value pair and easily find the data you need for your investigation.
It is also helpful to know which type of data the values are presented in–are they strings, timestamps, or numbers, for example–so that you can create precise queries to search them.
Most event types go to both Log Search and the Detection Engine, however, some event types are solely detection-based. There are also some schemas that do not have associated event types, which are part of the Audit Log.
Log Search and detection-based event types
All event types contain keys that can be referenced in your Log Search queries. The lists under each event type display one key on each line and the format of its corresponding value.
For example, "action": "STRING"
refers to a field or key named 'action' and the type of data it contains-in this case, it's a string of alphanumeric characters.
When you know which key you want to investigate, you can find the corresponding log set to select in Log Search.
This section contains the event types and keys that correspond to the log sets that are visible in Log Search. It also includes the event types and keys that inform the logic on which Detection Rules are created.
In the user interface, the Rules Logic tab of the Detection Rules screen specifies the source event type that the detection rule will monitor. For example, look at the from
parameter in the rule logic.
1from(2event_type = "third_party_alert"3)
The order of keys in the list
This documentation lists the event type keys in alphabetical order for easy reference. The user interface may show them in a different order.
The keys are presented in a list format, which shows parent fields and child fields where they exist. This can help you to search keys by using the query syntax where(parentfield.childfield="value")
.
Active Directory Admin Activity
ad_admin
Key | Value format |
---|---|
action | STRING |
group | STRING |
group_domain | STRING |
group_scope | STRING |
r7_context | |
source_user | |
rrn | RRN |
name | STRING |
type | STRING |
domain | STRING |
target_user | |
rrn | RRN |
name | STRING |
type | STRING |
domain | STRING |
source_account | |
rrn | RRN |
name | STRING |
type | STRING |
target_account | |
rrn | RRN |
name | STRING |
type | STRING |
source_account | STRING |
source_asset | STRING |
source_data | STRING |
source_json | {} |
source_user | STRING |
source_user_domain | STRING |
target_account | STRING |
target_user | STRING |
target_user_domain | STRING |
timestamp | TIMESTAMP |
Active Directory Admin Activity event type code block
1{2"action": "STRING",3"group": "STRING",4"group_domain": "STRING",5"group_scope": "STRING",6"r7_context": {7"source_user": {8"rrn": "RRN",9"name": "STRING",10"type": "STRING",11"domain": "STRING"12},13"target_user": {14"rrn": "RRN",15"name": "STRING",16"type": "STRING",17"domain": "STRING"18},19"source_account": {20"rrn": "RRN",21"name": "STRING",22"type": "STRING"23},24"target_account": {25"rrn": "RRN",26"name": "STRING",27"type": "STRING"28}29},30"source_account": "STRING",31"source_asset": "STRING",32"source_data": "STRING",33"source_json": {{}},34"source_user": "STRING",35"source_user_domain": "STRING",36"target_account": "STRING",37"target_user": "STRING",38"target_user_domain": "STRING"39"timestamp": "TIMESTAMP",40}
Advanced Malware Alert
advanced_malware
Key | Value format |
---|---|
asset | STRING |
alert_name | STRING |
custom_data | {} |
destination_address | STRING |
destination_port | STRING |
destination_user | STRING |
destination_user_domain | STRING |
geoip_city | STRING |
geoip_country_code | STRING |
geoip_country_name | STRING |
geoip_organization | STRING |
geoip_region | STRING |
protocol | STRING |
r7_context | |
asset | |
rrn | RRN |
name | STRING |
type | STRING |
source_user | |
rrn | RRN |
name | STRING |
type | STRING |
domain | STRING |
secondary_asset | |
rrn | RRN |
name | STRING |
type | STRING |
destination_user | |
rrn | RRN |
name | STRING |
type | STRING |
domain | STRING |
secondary_asset | STRING |
severity | STRING |
signature_name | STRING |
source_address | STRING |
source_data | STRING |
source_port | STRING |
source_user | STRING |
source_user_domain | STRING |
timestamp | TIMESTAMP |
Advanced Malware Alert event type code block
1{2"asset": "STRING",3"alert_name": "STRING",4"custom_data": {},5"destination_address": "STRING",6"destination_port": "STRING",7"destination_user": "STRING",8"destination_user_domain": "STRING"9"geoip_city": "STRING",10"geoip_country_code": "STRING",11"geoip_country_name": "STRING",12"geoip_organization": "STRING",13"geoip_region": "STRING",14"protocol": "STRING",15"r7_context": {16"asset": {17"rrn": "RRN",18"name": "STRING",19"type": "STRING"20},21"source_user": {22"rrn": "RRN",23"name": "STRING",24"type": "STRING",25"domain": "STRING"26},27"secondary_asset": {28"rrn": "RRN",29"name": "STRING",30"type": "STRING"31},32"destination_user": {33"rrn": "RRN",34"name": "STRING",35"type": "STRING",36"domain": "STRING"37}38},39"secondary_asset": "STRING",40"severity": "STRING",41"signature_name": "STRING",42"source_address": "STRING",43"source_data": "STRING",44"source_port": "STRING",45"source_user": "STRING",46"source_user_domain": "STRING",47"timestamp": "TIMESTAMP",48}49
Asset Authentication
asset_auth
Key | Value format |
---|---|
destination_account | STRING |
destination_account_sid | STRING |
destination_asset | STRING |
destination_asset_address | STRING |
destination_domain | STRING |
destination_local_account | STRING |
destination_user | STRING |
logon_type | STRING |
new_authentication | STRING |
new_source_authentication | STRING |
new_source_for_account | STRING |
r7_context | |
source_asset | |
rrn | RRN |
name | STRING |
type | STRING |
destination_user | |
rrn | RRN |
name | STRING |
type | STRING |
domain | STRING |
destination_asset | |
rrn | RRN |
name | STRING |
type | STRING |
destination_account | |
rrn | RRN |
name | STRING |
type | STRING |
result | STRING |
service | STRING |
source_account | STRING |
source_asset | STRING |
source_asset_address | STRING |
source_data | STRING |
source_domain | STRING |
source_json | {} |
source_user | STRING |
timestamp | TIMESTAMP |
Asset Authentication event type code block
1{2"destination_account": "STRING",3"destination_account_sid": "STRING",4"destination_asset": "STRING",5"destination_asset_address": "STRING",6"destination_domain": "STRING",7"destination_local_account": "STRING",8"destination_user": "STRING",9"logon_type": "STRING",10"new_authentication": "STRING",11"new_source_authentication": "STRING"12"new_source_for_account": "STRING",13"r7_context": {14"source_asset": {15"rrn": "RRN",16"name": "STRING",17"type": "STRING"18},19"destination_user": {20"rrn": "RRN",21"name": "STRING",22"type": "STRING",23"domain": "STRING"24},25"destination_asset": {26"rrn": "RRN",27"name": "STRING",28"type": "STRING"29},30"destination_account": {31"rrn": "RRN",32"name": "STRING",33"type": "STRING"34}35},36"result": "STRING",37"service": "STRING",38"source_account": "STRING",39"source_asset": "STRING",40"source_asset_address": "STRING",41"source_data": "STRING",42"source_domain": "STRING",43"source_json": {},44"source_user": "STRING",45"timestamp": "TIMESTAMP",46}
Cloud Service Activity
cloud_service_activity
Key | Value format |
---|---|
action | STRING |
service | STRING |
source_account | STRING |
source_json | {} |
source_user | STRING |
timestamp | TIMESTAMP |
user_agent | STRING |
Cloud Service Activity event type code block
1{2"action": "STRING",3"service": "STRING",4"source_account": "STRING"5"source_json": {},6"source_user": "STRING",7"timestamp": "TIMESTAMP",8"user_agent": "STRING",9}
Cloud Service Admin Activity
cloud_service_admin
Key | Value format |
---|---|
action | STRING |
service | STRING |
source_account | STRING |
source_json | {} |
source_user | STRING |
target_account | STRING |
target_user | STRING |
timestamp | TIMESTAMP |
user_agent | STRING |
Cloud Service Admin Activity event type code block
1{2"action": "STRING",3"service": "STRING",4"source_account": "STRING",5"source_json": {},6"source_user": "STRING",7"target_account": "STRING"8"target_user": "STRING",9"timestamp": "TIMESTAMP",10"user_agent": "STRING",11}
DNS Query
dns
Key | Value format |
---|---|
asset | STRING |
custom_data | {} |
dns_server_port | STRING |
dns_server_address | STRING |
public_suffix | STRING |
query | STRING |
query_blocked | STRING |
query_class | STRING |
query_type | STRING |
r7_context | |
user | |
rrn | RRN |
name | STRING |
type | STRING |
domain | STRING |
asset | |
rrn | RRN |
name | STRING |
type | STRING |
source_address | STRING |
source_data | STRING |
source_port | STRING |
top_private_domain | STRING |
timestamp | TIMESTAMP |
user | STRING |
observation_count | NUMERIC |
first_observed_time | TIMESTAMP |
last_observed_time | TIMESTAMP |
user_domain | STRING |
This event type contains deduplicated data.
DNS Query event type code block
1{2"asset": "STRING",3"custom_data": {},4"dns_server_port": "STRING",5"dns_server_address": "STRING",6"public_suffix": "STRING",7"query": "STRING",8"query_blocked": "STRING",9"query_class": "STRING",10"query_type": "STRING",11"r7_context": {12"user": {13"rrn": "RRN",14"name": "STRING",15"type": "STRING",16"domain": "STRING"17},18"asset": {19"rrn": "RRN",20"name": "STRING",21"type": "STRING"22}23},24"source_address": "STRING",25"source_data": "STRING",26"source_port": "STRING",27"top_private_domain": "STRING"28"timestamp": "TIMESTAMP",29"user": "STRING",30"observation_count": "NUMERIC",31"first_observed_time": "TIMESTAMP",32"last_observed_time": "TIMESTAMP",33"user_domain": "STRING",34}
Endpoint Activity
Process Start Event
process_start_event
Key | Value format |
---|---|
dns_domain | STRING |
duplicated_events | LONG |
endpoint_id | STRING |
endpoint_vendor | STRING |
env_vars | |
var | STRING |
val | STRING |
parent_val | STRING |
hostname | STRING |
os_type | STRING |
parents_process | |
account_domain | STRING |
addr | STRING |
cmd_line | STRING |
egid | NUMERIC |
egid_name | STRING |
euid | NUMERIC |
euid_name | STRING |
exe_file | |
author | STRING |
countersigning_chain | |
subject | STRING |
issue | STRING |
thumbprint | STRING |
created | STRING |
description | STRING |
gid | NUMERIC |
group | STRING |
hashes | |
md5 | STRING |
sha256 | STRING |
sha1 | STRING |
internal_name | STRING |
last_accessed | STRING |
last_modified | STRING |
orig_filename | STRING |
owner | STRING |
permissions | STRING |
product_name | STRING |
signing_chain | |
subject | STRING |
issuer | STRING |
thumbprint | STRING |
signing_status | STRING |
size | LONG |
uid | NUMERIC |
version | STRING |
exe_path | STRING |
fsgid | NUMERIC |
fsuid | NUMERIC |
gid | NUMERIC |
group | STRING |
hash_reputation | |
engine_count | NUMERIC |
engine_match | NUMERIC |
engine_percent | DOUBLE |
first_analyzed_time | STRING |
reliability | STRING |
reputation | STRING |
threat_level | STRING |
img_path | STRING |
name | STRING |
pid | NUMERIC |
port | NUMERIC |
ppid | NUMERIC |
r7_id | STRING |
rgid | NUMERIC |
rgid_name | STRING |
ruid | NUMERIC |
ruid_name | STRING |
session | NUMERIC |
sgid | NUMERIC |
start_time | STRING |
suid | NUMERIC |
uid | NUMERIC |
username | STRING |
process | |
account_domain | STRING |
addr | STRING |
cmd_line | STRING |
egid | NUMERIC |
egid_name | STRING |
euid | NUMERIC |
euid_name | STRING |
exe_file | |
author | STRING |
countersigning_chain | |
subject | STRING |
issuer | STRING |
thumbprint | STRING |
created | STRING |
description | STRING |
gid | NUMERIC |
group | STRING |
hashes | |
md5 | STRING |
sha256 | STRING |
sha1 | STRING |
internal_name | STRING |
last_accessed | STRING |
last_modified | STRING |
orig_filename | STRING |
owner | STRING |
permissions | STRING |
product_name | STRING |
signing_chain | |
subject | STRING |
issuer | STRING |
thumbprint | STRING |
signing_status | STRING |
size | LONG |
uid | NUMERIC |
version | STRING |
exe_path | STRING |
fsgid | NUMERIC |
fsuid | NUMERIC |
gid | NUMERIC |
group | STRING |
hash_reputation | |
engine_count | NUMERIC |
engine_match | NUMERIC |
engine_percent | DOUBLE |
first_analyzed_time | STRING |
reliability | STRING |
reputation | STRING |
threat_level | STRING |
img_path | STRING |
name | STRING |
pid | NUMERIC |
port | NUMERIC |
r7_id | STRING |
rgid | NUMERIC |
rgid_name | STRING |
ruid | NUMERIC |
ruid_name | STRING |
session | LONG |
sgid | NUMERIC |
start_time | STRING |
suid | NUMERIC |
uid | NUMERIC |
username | STRING |
r7_hostid | STRING |
Endpoint Activity, process_start_event event type code block
1{2"dns_domain": "STRING",3"duplicated_events": "LONG",4"endpoint_id": "STRING",5"endpoint_vendor": "STRING",6"env_vars": [7{8"var": "STRING",9"val": "STRING",10"parent_val": "STRING"11}12],13"hostname": "STRING",14"os_type": "STRING",15"parent_process":{16"account_domain": "STRING",17"addr": "STRING",18"cmd_line": "STRING",19"egid": "NUMERIC",20"egid_name": "STRING",21"euid": "NUMERIC",22"euid_name": "STRING",23"exe_file": {24"author": "STRING",25"countersigning_chain": [26{27"subject": "STRING",28"issuer": "STRING",29"thumbprint": "STRING"30}31],32"created": "STRING",33"description": "STRING",34"gid": "NUMERIC",35"group": "STRING",36"hashes":{37"md5": "STRING",38"sha256": "STRING",39"sha1": "STRING"40},41"internal_name": "STRING",42"last_accessed": "STRING",43"last_modified": "STRING",44"orig_filename": "STRING",45"owner": "STRING",46"permissions": "STRING",47"product_name": "STRING",48"signing_chain": [49{50"subject": "STRING",51"issuer": "STRING",52"thumbprint": "STRING"53}54],55"signing_status": "STRING",56"size": "LONG",57"uid": "NUMERIC",58"version": "STRING"59},60"exe_path": "STRING",61"fsgid": "NUMERIC",62"fsuid": "NUMERIC",63"gid": "NUMERIC",64"group": "STRING",65"hash_reputation": {66"engine_count": "NUMERIC",67"engine_match": "NUMERIC",68"engine_percent": "DOUBLE",69"first_analyzed_time": "STRING",70"reliability": "STRING",71"reputation": "STRING",72"threat_level": "STRING"73},74"img_path": "STRING",75"name": "STRING",76"pid": "NUMERIC",77"port": "NUMERIC",78"ppid": "NUMERIC",79"r7_id": "STRING",80"rgid": "NUMERIC",81"rgid_name": "STRING",82"ruid": "NUMERIC",83"ruid_name": "STRING",84"session": "LONG",85"sgid": "NUMERIC",86"start_time": "STRING",87"suid": "NUMERIC",88"uid": "NUMERIC",89"username": "STRING"90}91},92"process": {93"account_domain": "STRING",94"addr": "STRING",95"cmd_line": "STRING",96"egid": "NUMERIC",97"egid_name": "STRING",98"euid": "NUMERIC",99"euid_name": "STRING",100"exe_file": {101"author": "STRING",102"countersigning_chain": [103{104"subject": "STRING",105"issuer": "STRING",106"thumbprint": "STRING"107}108],109"created": "STRING",110"description": "STRING",111"gid": "NUMERIC",112"group": "STRING",113"hashes": {114"md5": "STRING",115"sha256": "STRING",116"sha1": "STRING"117},118"internal_name": "STRING",119"last_accessed": "STRING",120"last_modified": "STRING",121"orig_filename": "STRING",122"owner": "STRING",123"permissions": "STRING",124"product_name": "STRING",125"signing_chain": [126{127"subject": "STRING",128"issuer": "STRING",129"thumbprint": "STRING"130}131],132"signing_status": "STRING",133"size": "LONG",134"uid": "NUMERIC",135"version": "STRING"136},137"exe_path": "STRING",138"fsgid": "NUMERIC",139"fsuid": "NUMERIC",140"gid": "NUMERIC",141"group": "STRING",142"hash_reputation": {143"engine_count": "NUMERIC",144"engine_match": "NUMERIC",145"engine_percent": "DOUBLE",146"first_analyzed_time": "STRING",147"reliability": "STRING",148"reputation": "STRING",149"threat_level": "STRING"150},151"img_path": "STRING",152"name": "STRING",153"pid": "NUMERIC",154"port": "NUMERIC",155"r7_id": "STRING",156"rgid": "NUMERIC",157"rgid_name": "STRING",158"ruid": "NUMERIC",159"ruid_name": "STRING",160"session": "LONG",161"sgid": "NUMERIC",162"start_time": "STRING",163"suid": "NUMERIC",164"uid": "NUMERIC",165"username": "STRING"166}167},168"r7_hostid": "STRING"169}
Netbios Poisoning
netbios_poisoning
Key | Value format |
---|---|
timestamp | TIMESTAMP |
poisoner_asset | STRING |
observing_asset | STRING |
poisoner_address | STRING |
protocol | STRING |
queried_hostname | STRING |
source_json | |
protocol | STRING |
poisonerAddresses | STRING |
queriedHostname | STRING |
agentHostname | STRING |
r7_context | |
poisoner_asset | |
type | STRING |
rrn | RRN |
name | STRING |
observing_asset | |
type | STRING |
rrn | RRN |
name | STRING |
Endpoint Activity, netbios_poisoning event type code block
1{2"timestamp": "TIMESTAMP",3"poisoner_asset": "STRING",4"observing_asset": "STRING",5"poisoner_address": "STRING",6"protocol": "STRING",7"queried_hostname": "STRING",8"source_json": {9"protocol": "STRING",10"poisonerAddresses": [11"STRING"12],13"queriedHostname": "STRING",14"agentHostname": "STRING"15},16"r7_context": {17"poisoner_asset": {18"type": "STRING",19"rrn": "RRN",20"name": "STRING"21},22"observing_asset": {23"type": "STRING",24"rrn": "RRN",25"name": "STRING"26}27}28}
Local Service Creation
local_service_creation
Key | Value format |
---|---|
timestamp | TIMESTAMP |
asset | STRING |
service_name | STRING |
service_cmdline | STRING |
source_json | |
sourceName | STRING |
insertionStrings | STRING |
eventCode | STRING |
computerName | STRING |
sid | STRING |
isDomainController | STRING |
eventData | STRING |
timeWritten | TIMESTAMP |
r7_context | |
asset | |
type | STRING |
rrn | RRN |
name | STRING |
Endpoint Activity, local_service_creation event type code block
1{2"timestamp": "TIMESTAMP",3"asset": "STRING",4"service_name": "STRING",5"service_cmdline": "STRING",6"source_json": {7"sourceName": "STRING",8"insertionStrings": [9"STRING",10"STRING",11"STRING",12"STRING",13""14],15"eventCode": STRING,16"computerName": "STRING",17"sid": "STRING",18"isDomainController": STRING,19"eventData": STRING,20"timeWritten": "TIMESTAMP"21},22"r7_context": {23"asset": {24"type": "STRING",25"rrn": "RRN",26"name": "STRING"27}28}29}
Sysmon
sysmon
InsightIDR collects these Sysmon event IDs from Microsoft:
- Network Connection
- Create Remote Thread
- Process Access
- Registry Event
- Process Tampering
Depending on which event ID is collected, the shape of the event
object will differ. The event
object is defined by Microsoft and passed to InsightIDR. To learn more, read Microsoft’s documentation at: https://learn.microsoft.com/en-us/sysinternals/downloads/sysmon
Note: geoip
lookups will only be populated for events with external IP addresses, for example, Network Connection events.
Key | Value format |
---|---|
hostname | STRING |
dns_domain | STRING |
r7_hostid | STRING |
os_type | STRING |
event_id | NUMBER |
event_name | STRING |
event_provider | STRING |
event | OBJECT |
r7_context | OBJECT |
geoip_ip | STRING |
geoip_city | STRING |
geoip_country_code | STRING |
geoip_country_name | STRING |
geoip_organization | STRING |
geoip_region | STRING |
Sysmon event type code block
1{2"hostname": "STRING",3"dns_domain": "STRING",4"r7_hostid": "STRING",5"os_type": "STRING",6"event_id": "NUMBER",7"event_name": "STRING",8"event_provider": "STRING",9"event": "OBJECT",10"r7_context": "OBJECT",11"geoip_ip": "STRING",12"geoip_city": "STRING",13"geoip_country_code": "STRING",14"geoip_country_name": "STRING",15"geoip_organization": "STRING",16"geoip_region": "STRING",17}
Endpoint Health
Job Status
job_status
Key | Value format |
---|---|
timestamp | TIMESTAMP |
job | STRING |
hostname | STRING |
status | STRING |
message | STRING |
invocation_id | STRING |
events_reported | NUMERIC |
queued_time | TIMESTAMP |
started_time | TIMESTAMP |
finished_time | TIMESTAMP |
r7_context | |
asset | |
rrn | STRING |
name | STRING |
type | STRING |
r7_hostid | STRING |
source_json | OBJECT |
Endpoint Health, job_status event type code block
1{2"timestamp": "TIMESTAMP",3"job": "STRING",4"hostname": "STRING",5"status": "STRING",6"message": "STRING",7"invocation_id": "STRING",8"events_reported": "STRING",9"queued_time": "TIMESTAMP",10"started_time": "TIMESTAMP",11"finished_time": "TIMESTAMP",12"r7_context": {13"asset": {14"rrn": "STRING",15"name": "STRING",16"type": "STRING",17}18}19"r7_hostid": "STRING",20"source_json": "OBJECT",21}
File Access Activity
file_access
Key | Value format |
---|---|
access_types | STRING |
account | STRING |
file_extension | STRING |
file_name | STRING |
file_path | STRING |
file_share | STRING |
service | STRING |
source_address | STRING |
source_asset | STRING |
source_json | {} |
target_address | STRING |
timestamp | TIMESTAMP |
user | STRING |
File Access Activity event type code block
1{2"access_types": "STRING",3"account": "STRING",4"file_extension": "STRING",5"file_name": "STRING",6"file_path": "STRING",7"file_share": "STRING",8"service": "STRING",9"source_address": "STRING",10"source_asset": "STRING",11"source_json": {},12"target_address": "STRING"13"timestamp": "TIMESTAMP",14"user": "STRING",15}
File Modification Activity
file_modification
Key | Value format |
---|---|
account | STRING |
asset | STRING |
asset_address | STRING |
asset_os_family | STRING |
file_event | STRING |
file_extension | STRING |
file_name | STRING |
file_path | STRING |
process | STRING |
process_id | STRING |
source_json | {} |
timestamp | TIMESTAMP |
user | STRING |
File Modification Activity event type code block
1{2"account": "STRING",3"asset": "STRING",4"asset_address": "STRING",5"asset_os_family": "STRING"6"file_event": "STRING",7"file_extension": "STRING",8"file_name": "STRING",9"file_path": "STRING",10"process": "STRING",11"process_id": "STRING",12"source_json": {},13"timestamp": "TIMESTAMP",14"user": "STRING",15}
Firewall Activity
firewall
Key | Value format |
---|---|
asset | STRING |
community_id | STRING |
connection_status | STRING |
custom_data | {} |
destination_address | STRING |
destination_port | STRING |
direction | STRING |
geoip_city | STRING |
geoip_country_code | STRING |
geoip_country_name | STRING |
geoip_organization | STRING |
geoip_region | STRING |
incoming_bytes | STRING |
r7_context | |
user | |
rrn | RRN |
name | STRING |
type | STRING |
asset | |
rrn | RRN |
name | STRING |
type | STRING |
outgoing_bytes | STRING |
source_address | STRING |
source_data | STRING |
source_json | {} |
source_port | STRING |
transport_protocol | STRING |
timestamp | TIMESTAMP |
user | STRING |
observation_count | NUMERIC |
first_observed_time | TIMESTAMP |
last_observed_time | TIMESTAMP |
This event type contains deduplicated data.
Firewall Activity event type code block
1{2"asset": "STRING",3"community_id": "STRING",4"connection_status": "STRING",5"custom_data": {},6"destination_address": "STRING"7"destination_port": "STRING",8"direction": "STRING",9"geoip_city": "STRING",10"geoip_country_code": "STRING",11"geoip_country_name": "STRING",12"geoip_organization": "STRING",13"geoip_region": "STRING",14"incoming_bytes": "STRING",15"r7_context": {16"user": {17"rrn": "RRN",18"name": "STRING",19"type": "STRING"20},21"asset": {22"rrn": "RRN",23"name": "STRING",24"type": "STRING"25}26},27"outgoing_bytes": "STRING",28"source_address": "STRING",29"source_data": "STRING",30"source_json": {},31"source_port": "STRING",32"transport_protocol": "STRING",33"timestamp": "TIMESTAMP",34"user": "STRING",35"observation_count": "NUMERIC",36"first_observed_time": "TIMESTAMP",37"last_observed_time": "TIMESTAMP",38}
Host To IP Observations
host_name_to_ip
Key | Value format |
---|---|
account | STRING |
account_domain | STRING |
action | STRING |
asset | STRING |
client_mac | STRING |
custom_data | {} |
host | STRING |
ip | STRING |
r7_context | |
host | |
rrn | RRN |
name | STRING |
type | STRING |
user | |
rrn | RRN |
name | STRING |
type | STRING |
domain | STRING |
asset | |
rrn | RRN |
name | STRING |
type | STRING |
account | |
rrn | RRN |
name | STRING |
type | STRING |
source_data | STRING |
source_json | {} |
timestamp | TIMESTAMP |
user | STRING |
Host to IP event type code block
1{2"account": "STRING",3"account_domain": "STRING",4"action": "STRING",5"asset": "STRING",6"client_mac": "STRING",7"custom_data": {},8"host": "STRING",9"ip": "STRING",10"observation_status": "STRING"11"r7_context": {12"host": {13"rrn": "RRN",14"name": "STRING",15"type": "STRING"16},17"user": {18"rrn": "RRN",19"name": "STRING",20"type": "STRING",21"domain": "STRING"22},23"asset": {24"rrn": "RRN",25"name": "STRING",26"type": "STRING"27},28"account": {29"rrn": "RRN",30"name": "STRING",31"type": "STRING"32}33},34"source_data": "STRING",35"source_json": {},36"timestamp": "TIMESTAMP",37"user": "STRING",38}
IDS Alert
ids
Key | Value format |
---|---|
asset | STRING |
category | STRING |
community_id | STRING |
description | STRING |
destination_bytes | STRING |
destination_ip | STRING |
destination_port | STRING |
destination_packet_count | STRING |
ids_app_protocol | STRING |
ids_app_protocol_info | STRING |
ja3 | |
hash | STRING |
string | STRING |
ja3s | |
hash | STRING |
string | STRING |
serial | STRING |
subject | STRING |
version | STRING |
issuerdn | STRING |
notafter | STRING |
notbefore | STRING |
fingerprint | STRING |
source_data | STRING |
source_json | STRING |
timestamp | STRING |
ids_flow_initiated | TIMESTAMP |
protocol | STRING |
severity | STRING |
signature | STRING |
signature_revision | STRING |
source_bytes | STRING |
source_ip | STRING |
source_packet_count | STRING |
source_port | STRING |
timestamp | TIMESTAMP |
total_bytes | STRING |
total_packet_count | STRING |
user | STRING |
IDS Alert event type code block
1{2"asset": "STRING",3"category": "STRING",4"community_id": "STRING",5"description": "STRING",6"destination_bytes": "STRING",7"destination_ip": "STRING",8"destination_port": "STRING",9"destination_packet_count": "STRING"10"ids_app_protocol": "STRING",11"ids_app_protocol_info": {12"ja3": {13"hash": "STRING",14"string": "STRING"15},16"ja3s": {17"hash": "STRING",18"string": "STRING"19},20"serial": "STRING",21"subject": "STRING",22"version": "STRING",23"issuerdn": "STRING",24"notafter": "STRING",25"notbefore": "STRING",26"fingerprint": "STRING"27},28"ids_flow_initiated": "TIMESTAMP",29"protocol": "STRING",30"severity": "STRING",31"signature": "STRING",32"signature_revision": "STRING",33"source_bytes": "STRING",34"source_ip": "STRING",35"source_packet_count": "STRING",36"source_port": "STRING",37"timestamp": "TIMESTAMP",38"total_bytes": "STRING",39"total_packet_count": "STRING",40"user": "STRING",41}
Ingress Authentication
ingress_auth
Key | Value format |
---|---|
account | STRING |
authentication_target | STRING |
custom_data | {} |
geoip_city | STRING |
geoip_country_code | STRING |
geoip_country_name | STRING |
geoip_organization | STRING |
geoip_region | STRING |
mobile_device_id | STRING |
r7_context | |
user | |
rrn | RRN |
name | STRING |
type | STRING |
domain | STRING |
account | |
rrn | RRN |
name | STRING |
type | STRING |
result | STRING |
service | STRING |
service_address | STRING |
source_data | STRING |
source_ip | STRING |
source_json | {} |
timestamp | TIMESTAMP |
user | STRING |
user_agent | STRING |
user_domain | STRING |
Ingress Authentication event type code block
1{2"account": "STRING",3"authentication_target": "STRING"4"custom_data": {},5"geoip_city": "STRING",6"geoip_country_code": "STRING",7"geoip_country_name": "STRING",8"geoip_organization": "STRING",9"geoip_region": "STRING",10"mobile_device_id": "STRING",11"r7_context": {12"user": {13"rrn": "RRN",14"name": "STRING",15"type": "STRING",16"domain": "STRING"17},18"account": {19"rrn": "RRN",20"name": "STRING",21"type": "STRING"22}23},24"result": "STRING",25"service": "STRING",26"service_address": "STRING",27"source_data": "STRING",28"source_ip": "STRING",29"source_json": {},30"timestamp": "TIMESTAMP",31"user": "STRING",32"user_agent": "STRING",33"user_domain": "STRING",34}
Network Flow
flow
Key | Value format |
---|---|
app_protocol | STRING |
app_protocol_description | STRING |
community_id | STRING |
destination_address | STRING |
destination_asset | STRING |
destination_bytes | STRING |
destination_packet_count | STRING |
destination_port | STRING |
destination_user | STRING |
direction | STRING |
first_packet_time | TIMESTAMP |
flow_initiated | TIMESTAMP |
geoip_city | STRING |
geoip_country_code | STRING |
geoip_country_name | STRING |
geoip_organization | STRING |
geoip_region | STRING |
mobile_device_id | STRING |
last_packet_time | TIMESTAMP |
r7_context | |
source_user | |
rrn | RRN |
name | STRING |
type | STRING |
source_asset | |
rrn | RRN |
name | STRING |
type | STRING |
destination_user | |
rrn | RRN |
name | STRING |
type | STRING |
destination_asset | |
rrn | RRN |
name | STRING |
type | STRING |
source_address | STRING |
source_asset | STRING |
source_bytes | STRING |
source_port | STRING |
source_json | STRING |
source_packet_count | TIMESTAMP |
source_user | STRING |
timestamp | TIMESTAMP |
total_bytes | STRING |
total_packet_count | STRING |
transport_protocol | STRING |
Network Flow event type code block
1{2"app_protocol": "STRING",3"app_protocol_description": "STRING",4"community_id": "STRING",5"destination_address": "STRING",6"destination_asset": "STRING",7"destination_bytes": "STRING",8"destination_packet_count": "STRING"9"destination_port": "STRING",10"destination_user": "STRING",11"direction": "STRING",12"first_packet_time": "TIMESTAMP",13"flow_initiated": "TIMESTAMP",14"geoip_city": "STRING",15"geoip_country_code": "STRING",16"geoip_country_name": "STRING",17"geoip_organization": "STRING",18"geoip_region": "STRING",19"last_packet_time": "TIMESTAMP",20"r7_context": {21"source_user": {22"rrn": "RRN",23"name": "STRING",24"type": "STRING"25},26"source_asset": {27"rrn": "RRN",28"name": "STRING",29"type": "STRING"30},31"destination_user": {32"rrn": "RRN",33"name": "STRING",34"type": "STRING"35},36"destination_asset": {37"rrn": "RRN",38"name": "STRING",39"type": "STRING"40}41},42"source_address": "STRING",43"source_asset": "STRING",44"source_bytes": "STRING",45"source_port": "STRING",46"source_packet_count": "STRING",47"source_user": "STRING",48"timestamp": "TIMESTAMP",49"total_bytes": "STRING",50"total_packet_count": "STRING",51"transport_protocol": "STRING",52}
SSO
sso
Key | Value format |
---|---|
user | STRING |
account | STRING |
service | STRING |
source_ip | STRING |
timestamp | TIMESTAMP |
geoip_city | STRING |
source_json | {} |
geoip_region | STRING |
sso_provider | STRING |
geoip_country_code | STRING |
geoip_country_name | STRING |
geoip_organization | STRING |
SSO event type code block
1{2"user": "STRING",3"account": "STRING",4"service": "STRING",5"source_ip": "STRING",6"timestamp": "TIMESTAMP",7"geoip_city": "STRING",8"source_json": {},9"geoip_region": "STRING",10"sso_provider": "STRING",11"geoip_country_code": "STRING",12"geoip_country_name": "STRING",13"geoip_organization": "STRING",14}
Third Party Alert
third_party_alert
Key | Value format |
---|---|
alert_id | STRING |
asset | STRING |
custom_data | {} |
description | STRING |
r7_context | |
user | |
rrn | RRN |
name | STRING |
type | STRING |
asset | |
rrn | RRN |
name | STRING |
type | STRING |
product | STRING |
severity | STRING |
source_data | STRING |
source_json | {} |
timestamp | TIMESTAMP |
title | STRING |
type | STRING |
user | STRING |
Third Party Alert event type code block
1{2"alert_id": "UUID",3"asset": "STRING",4"custom_data": {},5"description": "STRING",6"r7_context": {7"user": {8"rrn": "RRN",9"name": "STRING",10"type": "STRING"11},12"asset": {13"rrn": "RRN",14"name": "STRING",15"type": "STRING"16}17},18"product": "STRING",19"severity": "STRING",20"source_data": "STRING",21"source_json": {}22"timestamp": "TIMESTAMP",23"title": "STRING",24"type": "STRING",25"user": "STRING",26}
Virus Alert
virus
Key | Value format |
---|---|
account | STRING |
action | STRING |
action_status | STRING |
asset | STRING |
custom_data | {} |
error_code | STRING |
error_description | STRING |
file_path | STRING |
r7_context | |
user | |
rrn | RRN |
name | STRING |
type | STRING |
domain | STRING |
asset | |
rrn | RRN |
name | STRING |
type | STRING |
account | |
rrn | RRN |
name | STRING |
type | STRING |
risk | STRING |
source_address | STRING |
source_data | STRING |
source_json | {} |
timestamp | TIMESTAMP |
user | STRING |
user_domain | STRING |
Virus Alert event type code block
1{2"account": "STRING",3"action": "STRING",4"action_status": "STRING",5"asset": "STRING",6"custom_data": {},7"error_code": "STRING",8"error_description": "STRING"9"file_path": "STRING",10"r7_context": {11"user": {12"rrn": "RRN",13"name": "STRING",14"type": "STRING",15"domain": "STRING"16},17"asset": {18"rrn": "RRN",19"name": "STRING",20"type": "STRING"21},22"account": {23"rrn": "RRN",24"name": "STRING",25"type": "STRING"26}27},28"risk": "STRING",29"source_address": "STRING",30"source_data": "STRING",31"source_json": {},32"timestamp": "TIMESTAMP",33"user": "STRING",34"user_domain": "STRING",35}
Web Proxy Activity
web_proxy
Key | Value format |
---|---|
asset | STRING |
custom_data | {} |
destination_ip | STRING |
geoip_city | STRING |
geoip_country_code | STRING |
geoip_country_name | STRING |
geoip_organization | STRING |
geoip_region | STRING |
http_method | STRING |
incoming_bytes | STRING |
is_blocked | STRING |
outgoing_bytes | STRING |
public_suffix | STRING |
r7_context | |
user | |
rrn | RRN |
name | STRING |
type | STRING |
domain | STRING |
asset | |
rrn | RRN |
name | STRING |
type | STRING |
scheme | STRING |
source_data | STRING |
source_ip | STRING |
source_json | {} |
timestamp | TIMESTAMP |
top_private_domain | STRING |
url | STRING |
url_host | STRING |
url_path | STRING |
url_query | STRING |
user | STRING |
observation_count | NUMERIC |
first_observed_time | TIMESTAMP |
last_observed_time | TIMESTAMP |
user_agent | STRING |
user_domain | STRING |
This event type contains deduplicated data.
Web Proxy event type code block
1{2"asset": "STRING",3"custom_data": {},4"destination_ip": "STRING",5"geoip_city": "STRING",6"geoip_country_code": "STRING",7"geoip_country_name": "STRING",8"geoip_organization": "STRING",9"geoip_region": "STRING",10"http_method": "STRING",11"incoming_bytes": "STRING",12"is_blocked": "STRING",13"outgoing_bytes": "STRING",14"public_suffix": "STRING",15"r7_context": {16"user": {17"rrn": "RRN",18"name": "STRING",19"type": "STRING",20"domain": "STRING"21},22"asset": {23"rrn": "RRN",24"name": "STRING",25"type": "STRING"26}27},28"scheme": "STRING",29"source_data": "STRING",30"source_ip": "STRING",31"source_json": {},32"timestamp": "TIMESTAMP",33"top_private_domain": "STRING"34"url": "STRING",35"url_host": "STRING",36"url_path": "STRING",37"url_query": "STRING",38"user": "STRING",39"observation_count": "NUMERIC",40"first_observed_time": "TIMESTAMP",41"last_observed_time": "TIMESTAMP",42"user_agent": "STRING",43"user_domain": "STRING",44}
Web Server Access
web_server_access
Key | Value format |
---|---|
timestamp | TIMESTAMP |
source_address | STRING |
geoip_organization | STRING |
geoip_country_code | STRING |
geoip_country_name | STRING |
geoip_city | STRING |
geoip_region | STRING |
server_address | STRING |
url_host | STRING |
http_method | STRING |
url_path | STRING |
response_status | STRING |
outgoing_bytes | STRING |
user_agent | STRING |
referer | STRING |
forwarded_for | STRING |
auth_user | STRING |
Web Server Access event type code block
1{2"timestamp": "TIMESTAMP",3"source_address": STRING,4"geoip_organization": "STRING",5"geoip_country_code": "STRING",6"geoip_country_name": "STRING",7"geoip_city": "STRING",8"geoip_region": "STRING",9"server_address": "STRING",10"url_host": "STRING",11"http_method": "STRING",12"url_path": "STRING",13"response_status": "STRING",14"outgoing_bytes": "STRING",15"user_agent": "STRING",16"referer": "STRING",17"forwarded_for": "STRING",18"auth_user": "STRING",19}
Detection-based Event Types
Anomalous Data Transfer
anomalous_data_transfer
Key | Value format |
---|---|
analysis_hour_destinations | |
city | STRING |
dst_addr | NUMERIC |
dst_port | NUMERIC |
hostname | STRING |
cert_name | STRING |
country_code | STRING |
organization | STRING |
dst_bytes_human | STRING |
src_bytes_human | STRING |
dst_bytes_percent | NUMERIC |
src_bytes_percent | NUMERIC |
analysis_hour_stats | |
bytes_ratio | STRING |
num_destinations | NUMERIC |
incoming_bytes_human | STRING |
outgoing_bytes_human | STRING |
num_destination_ports | NUMERIC |
date | TIMESTAMP |
source_addresses | STRING |
source_asset_id | UUID |
source_asset_names | STRING |
Anomalous Data Transfer event type code block
1{2"analysis_hour_destinations": [3{4"city": "STRING",5"dst_addr": "NUMERIC",6"dst_port": "NUMERIC",7"hostname": "STRING",8"cert_name": "STRING",9"country_code": "STRING",10"organization": "STRING",11"dst_bytes_human": "STRING",12"src_bytes_human": "STRING",13"dst_bytes_percent": "NUMERIC",14"src_bytes_percent": "NUMERIC"15}16]17"analysis_hour_stats": {18"bytes_ratio": "STRING",19"num_destinations": "NUMERIC",20"incoming_bytes_human": "STRING",21"outgoing_bytes_human": "STRING",22"num_destination_ports": "NUMERIC"23},24"date": "TIMESTAMP",25"source_addresses": "STRING",26"source_asset_id": "UUID",27"source_asset_names": "STRING",28}
Audit Logs
The audit logs in InsightIDR capture a chronological view of every action taken in relation to a particular object, such as an investigation or alert. You can use Log Search to query the data in the audit log.
The log sets that are generated from the audit log originate from actions taken in InsightIDR, rather than event sources or the Insight Agent, so they don’t have event types.
InsightIDR Investigations
Key | Value format |
---|---|
time | TIMESTAMP |
action | STRING |
audit_id | STRING |
result | STRING |
access_method | STRING |
product | STRING |
description | STRING |
service_info | |
investigation_id | STRING |
investigation_name | STRING |
investigation_type | STRING |
investigation_rrn | RRN |
assigned_user | STRING |
assignee_login | STRING |
request | |
user_agent | STRING |
geo_location | |
organization | STRING |
country_name | STRING |
country_code | STRING |
city | STRING |
region | STRING |
ip | STRING |
user | |
STRING | |
name | STRING |
InsightIDR Investigations code block
1{2"time": "TIMESTAMP",3"action": "STRING",4"audit_id": "STRING",5"result": "STRING",6"access_method": "STRING",7"product": "STRING",8"description": "STRING",9"service_info": {10"investigation_id": "STRING",11"investigation_name": "STRING",12"investigation_type": "STRING",13"investigation_rrn": "RRN",14"assigned_user": "STRING",15"assignee_login": "STRING"16},17"request": {18"user_agent": "STRING",19"geo_location": {20"organization": "STRING",21"country_name": "STRING",22"country_code": "STRING",23"city": "STRING",24"region": "STRING"25},26"ip": "STRING",27"user": {28"email": "STRING",29"name": "STRING"30}31}32}
InsightIDR Alerts
Key | Value format |
---|---|
time | TIMESTAMP |
action | STRING |
audit_id | STRING |
result | STRING |
access_method | STRING |
product | STRING |
description | STRING |
service_info | |
alert_id | STRING |
alert_name | STRING |
alert_type | STRING |
alert_rrn | RRN |
assigned_user | STRING |
assignee_login | STRING |
request | |
user_agent | STRING |
geo_location | |
organization | STRING |
country_name | STRING |
country_code | STRING |
city | STRING |
region | STRING |
ip | STRING |
user | |
STRING | |
name | STRING |
InsightIDR Alerts code block
1{2"time": "TIMESTAMP",3"action": "STRING",4"audit_id": "STRING",5"result": "STRING",6"access_method": "STRING",7"product": "STRING",8"description": "STRING",9"service_info": {10"alert_id": "STRING",11"alert_name": "STRING",12"alert_type": "STRING",13"alert_rrn": "RRN",14"assigned_user": "STRING",15"assignee_login": "STRING"16},17"request": {18"user_agent": "STRING",19"geo_location": {20"organization": "STRING",21"country_name": "STRING",22"country_code": "STRING",23"city": "STRING",24"region": "STRING"25},26"ip": "STRING",27"user": {28"email": "STRING",29"name": "STRING"30}31}32}